- المجال: Computer
- Number of terms: 4807
- Number of blossaries: 1
- Company Profile:
Sun Microsystems is a multinational vendor of computers, computer software and hardware, and information technology services.
An enterprise bean that is an asynchronous message consumer. A message-driven bean has no state for a specific client, but its instance variables can contain state across the handling of client messages, including an open database connexion and an object reference to an EJB object. A client accesses a message-driven bean by sending messages to the destination for which the bean is a message listener.
Industry:Computer
An authorization rule that determines who is permitted to execute one or more enterprise bean methods.
Industry:Computer
An authentication mechanism that uses HTTP over SSL, in which the server and, optionally, the client authenticate each other with a public key certificate that conforms to a standard that is defined by X.509 Public Key Infrastructure.
Industry:Computer
An authentication mechanism in which a Web server authenticates an entity via a user name and password obtained using the Web application's built-in authentication mechanism.
Industry:Computer
An authentication mechanism in which a Web container provides an application-specific form for logging in. This form of authentication uses Base64 encoding and can expose user names and passwords unless all connexions are over SSL.
Industry:Computer
An authentication mechanism in which a Web application authenticates itself to a Web server by sending the server a message digest along with its HTTP request message. The digest is computed by employing a one-way hash algorithm to a concatenation of the HTTP request message and the client's password. The digest is typically much smaller than the HTTP request and doesn't contain the password.
Industry:Computer
An authentication mechanism employed by two parties for the purpose of proving each other's identity to one another.
Industry:Computer
An authenticated set of users classified by common traits such as job title or customer profile. Groups are also associated with a set of roles, and every user that is a member of a group inherits all the roles assigned to that group.
Industry:Computer
An audit trail contains one record for each logged activity/event. It is a chronological record that enables the reconstruction, review, and examination of a sequence of activities.
Industry:Computer
An audit log where audit records are stored. This term is used in XSCF firmware.
Industry:Computer